• Title/Summary/Keyword: Collection time

Search Result 2,326, Processing Time 0.033 seconds

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Intelligent Optimal Route Planning Based on Context Awareness (상황인식 기반 지능형 최적 경로계획)

  • Lee, Hyun-Jung;Chang, Yong-Sik
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.117-137
    • /
    • 2009
  • Recently, intelligent traffic information systems have enabled people to forecast traffic conditions before hitting the road. These convenient systems operate on the basis of data reflecting current road and traffic conditions as well as distance-based data between locations. Thanks to the rapid development of ubiquitous computing, tremendous context data have become readily available making vehicle route planning easier than ever. Previous research in relation to optimization of vehicle route planning merely focused on finding the optimal distance between locations. Contexts reflecting the road and traffic conditions were then not seriously treated as a way to resolve the optimal routing problems based on distance-based route planning, because this kind of information does not have much significant impact on traffic routing until a a complex traffic situation arises. Further, it was also not easy to take into full account the traffic contexts for resolving optimal routing problems because predicting the dynamic traffic situations was regarded a daunting task. However, with rapid increase in traffic complexity the importance of developing contexts reflecting data related to moving costs has emerged. Hence, this research proposes a framework designed to resolve an optimal route planning problem by taking full account of additional moving cost such as road traffic cost and weather cost, among others. Recent technological development particularly in the ubiquitous computing environment has facilitated the collection of such data. This framework is based on the contexts of time, traffic, and environment, which addresses the following issues. First, we clarify and classify the diverse contexts that affect a vehicle's velocity and estimates the optimization of moving cost based on dynamic programming that accounts for the context cost according to the variance of contexts. Second, the velocity reduction rate is applied to find the optimal route (shortest path) using the context data on the current traffic condition. The velocity reduction rate infers to the degree of possible velocity including moving vehicles' considerable road and traffic contexts, indicating the statistical or experimental data. Knowledge generated in this papercan be referenced by several organizations which deal with road and traffic data. Third, in experimentation, we evaluate the effectiveness of the proposed context-based optimal route (shortest path) between locations by comparing it to the previously used distance-based shortest path. A vehicles' optimal route might change due to its diverse velocity caused by unexpected but potential dynamic situations depending on the road condition. This study includes such context variables as 'road congestion', 'work', 'accident', and 'weather' which can alter the traffic condition. The contexts can affect moving vehicle's velocity on the road. Since these context variables except for 'weather' are related to road conditions, relevant data were provided by the Korea Expressway Corporation. The 'weather'-related data were attained from the Korea Meteorological Administration. The aware contexts are classified contexts causing reduction of vehicles' velocity which determines the velocity reduction rate. To find the optimal route (shortest path), we introduced the velocity reduction rate in the context for calculating a vehicle's velocity reflecting composite contexts when one event synchronizes with another. We then proposed a context-based optimal route (shortest path) algorithm based on the dynamic programming. The algorithm is composed of three steps. In the first initialization step, departure and destination locations are given, and the path step is initialized as 0. In the second step, moving costs including composite contexts into account between locations on path are estimated using the velocity reduction rate by context as increasing path steps. In the third step, the optimal route (shortest path) is retrieved through back-tracking. In the provided research model, we designed a framework to account for context awareness, moving cost estimation (taking both composite and single contexts into account), and optimal route (shortest path) algorithm (based on dynamic programming). Through illustrative experimentation using the Wilcoxon signed rank test, we proved that context-based route planning is much more effective than distance-based route planning., In addition, we found that the optimal solution (shortest paths) through the distance-based route planning might not be optimized in real situation because road condition is very dynamic and unpredictable while affecting most vehicles' moving costs. For further study, while more information is needed for a more accurate estimation of moving vehicles' costs, this study still stands viable in the applications to reduce moving costs by effective route planning. For instance, it could be applied to deliverers' decision making to enhance their decision satisfaction when they meet unpredictable dynamic situations in moving vehicles on the road. Overall, we conclude that taking into account the contexts as a part of costs is a meaningful and sensible approach to in resolving the optimal route problem.

Improvement of existing drainage system for leakage treatment in exiting underground structures (운영중인 지하구조물의 누수처리를 위한 유도배수공법의 개선)

  • Kim, Dong-Gyou;Yim, Min-Jin
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.4
    • /
    • pp.669-683
    • /
    • 2017
  • The objective of this study is to propose a modification of the previously proposed drainage system for catching the partial leakage of underground concrete structures. Two techniques were proposed for applying the drainage system only to the leaking parts. One was for conveying leaking groundwater to the collection point in the drainage system and the other was for conveying the collected groundwater to the primary drainage system of the underground concrete structure. Four waterproofing materials for conveying leaking groundwater to the catchment point of the drainage system, Durkflex made of porous rubber material, KE-45 silicone adhesive with super strong adhesion, Hotty-gel made of polymeric materials and general silicone adhesive were evaluated for waterproofing performance. Hotty-gel only showed perfect waterproof performance and the other three waterproof materials leaked. The modified drainage system with Hotty-gel and drainage pipe with fixed saddle to convey the leaking groundwater from the catchment point to the primary drainage system were tested on the concrete retaining wall. The waterproof performance and the drainage performance were evaluated by injecting 1,000 ml of water in the back of the modified drainage system at the 7-day, 14-day, 21-day, 28-day, 2-month and 3-month. There was no problem in waterproof performance and drainage performance of the modified drainage system during 3 months. In order to evaluate the construction period and construction cost of the modified drainage system, it was compared with the existing leaching repair method in surface cleaning stage, leakage treatment stage, and protective barrier stage. Total construction period and construction cost were compared in considering the contents of work, repair material, construction equipment, working time, and total number of workers. As a result of comparing and analyzing in each construction stage, it was concluded that the modified drainage system could save construction period and construction cost compared to the existing leaching repair method.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

An Empirical Study on the Importance of Psychological Contract Commitment in Information Systems Outsourcing (정보시스템 아웃소싱에서 심리적 계약 커미트먼트의 중요성에 대한 연구)

  • Kim, Hyung-Jin;Lee, Sang-Hoon;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.49-81
    • /
    • 2007
  • Research in the IS (Information Systems) outsourcing has focused on the importance of legal contracts and partnerships between vendors and clients. Without detailed legal contracts, there is no guarantee that an outsourcing vendor would not indulge in self-serving behavior. In addition, partnerships can supplement legal contracts in managing the relationship between clients and vendors legal contracts by itself cannot deal with all the complexity and ambiguity involved with IS outsourcing relationships. In this paper, we introduce a psychological contract (between client and vendor) as an important variable for IS outsourcing success. A psychological contract refers to individual's mental beliefs about his or her mutual obligations in a contractual relationship (Rousseau, 1995). A psychological contract emerges when one party believes that a promise of future returns has been made, a contribution has been given, and thus, an obligation has been created to provide future benefits (Rousseau, 1989). An employmentpsychological contract, which is a widespread concept in psychology, refers to employer and employee expectations of the employment relationship, i.e. mutual obligations, values, expectations and aspirations that operate over and above the formal contract of employment (Smithson and Lewis, 2003). Similar to the psychological contract between an employer and employee, IS outsourcing involves a contract and a set of mutual obligations between client and vendor (Ho et al., 2003). Given the lack of prior research on psychological contracts in the IS outsourcing context, we extend such studies and give insights through investigating the role of psychological contracts between client and vendor. Psychological contract theory offers highly relevant and sound theoretical lens for studying IS outsourcing management because of its six distinctive principles: (1) it focuses on mutual (rather than one-sided) obligations between contractual parties, (2) it's more comprehensive than the concept of legal contract, (3) it's an individual-level construct, (4) it changes over time, (5) it affects organizational behaviors, and (6) it's susceptible to organizational factors (Koh et al., 2004; Rousseau, 1996; Coyle-Shapiro, 2000). The aim of this paper is to put the concept, psychological contract commitment (PCC), under the spotlight, by finding out its mediating effects between legal contracts/partnerships and IS outsourcing success. Our interest is in the psychological contract commitment (PCC) or commitment to psychological contracts, which is the extent to which a partner consistently and deeply concerns with what the counter-party believes as obligations during the IS project. The basic premise for the hypothesized relationship between PCC and success is that for outsourcing success, client and vendor should continually commit to mutual obligations in which both parties believe, rather than to only explicit obligations. The psychological contract commitment playsa pivotal role in evaluating a counter-party because it reflects what one party really expects from the other. If one party consistently shows high commitment to psychological contracts, the other party would evaluate it positively. This will increase positive reciprocation efforts of the other party, thus leading to successful outsourcing outcomes (McNeeley and Meglino, 1994). We have used matched sample data for this research. We have collected three responses from each set of a client and a vendor firm: a project manager of the client firm, a project member from the vendor firm with whom the project manager cooperated, and an end-user of the client company who actually used the outsourced information systems. Special caution was given to the data collection process to avoid any bias in responses. We first sent three types of questionnaires (A, Band C) to each project manager of the client firm, asking him/her to answer the first type of questionnaires (A).

Growth of the Korean Public Library from the Point View of Acculturation (문화변용이론의 시각에서 본 우리나라 공공도서관의 발전과정)

  • Chun Myung Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.10
    • /
    • pp.39-70
    • /
    • 1983
  • The concept of the public library defined by the Korean Library Association does not describe the current state of the Korean public library but describes the public libraries in the western society. Korean public library was formed after the western public library but it was modified and reconciled with the tradition of Korea. The difference between the concepts occured in the acculturation process of the Korean public library. According to the International Encyclopeadia of the Social Sciences, acculturation comprehends those phenomena which result when groups of individuals having different cultures come into continuous firsthand contact, with subsequent changes in the original cultural patterns of either of both groups. Korea opened its door to western world in 1876, and it began to contact with the western world. As the consequence, the concept of the public library of the West diffused to Lee Dynasty which were characterized by the confucianism and the extended family system. These two characteristics were against the public library concept and it could not function as it was and it had to be modified to fit to Korean society. The American public library was formed by the diffusion of English public library. The concept fitted in the colonial American society which was characterized by the Christianity and nuclear family system. Religion and family life were closely knitted together and they contributed much to the formation of the American public library. Also the society needed various information to form their new nation. The need of the public library grew and the public library repidly developed as the American society was urbanized and industrialized. The changes of Korean public library has passed the following process of acculturation. 1. The Korean culture contacted with Western world. 2. The public library concept diffused to Korea, but the people were illiterate and the need of the public library was for the preservation of the old books. The collection was not for people. 3. The function of the public library in Korea was altered slightly as several intellectuals who formed the first modern public library tried to literate Koreans as a means of liberation :from Japan through the library service. 4. The traditional libraries such as sodandg and hyangyo disorganized and finally disappeared as the traditional elements of the culture disappeared and the new cultural elements prevailed in Korea. 5. When the traditional elements of culture were disorganized, a reinterpretation of the diffused culture appeared. With the appearance of the vouth group which was not existed in the traditional society, cultural facilities for them were needed. They began to use public library as their reading rooms. This pattern has been institutionalized ever since in Korean public library. 6. When the new element of the culture spread, the traditional cultural elements react against this element. As the new public libraries sprung out, there were movements to restore the old Korean tradition of the family libraries and Hyangyo to counteract to the new libraries. This movements were not successful and they all disappeared as they could not keep up the rapid social change occurred in the Korean society. 7. In the process of the cultral change, cultural lag occurred between the public library and the users who could not adopt to the new library. This has been continued to the present time. 8. This diffused concept of the public library was modified and became native to Korean society. However, the acculturation of the public library concept has not changed the traditional ideas of Korean people and their behavior. The Korean society recently has been changing rapidly and the function of the Korean public library is improving accordingly; 1. The extended Korean family system is disorganizing. As the consequence, the public library could substitute the family system offering information and recreation service, etc. 2. The growth of educated population is requiring a variety of library materials. An individual library can not meet the needs of them and cooperative library service will be needed to share resources. The public library will become the center of the cooperative service. 3. The Koreans are watching TV more hours than they read printed materials. For them, the public library needs to collect audiovisual materials. Especially the teaching materials should be all audiovisualized for the effective teaching. 4. Technology is developing rapidly in Korea, especially computer technology is applied in many parts of the society. This will also influence library service. The public library will be developing as the centralized library computer system. When the Korean public library functions as the extended family system and the center of the cooperative library system, the Korean public library will be functioning as the public library defined by the Korean Library Association.

  • PDF

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.

The Evaluation of Images with Various Filters in I-131 SPECT/CT (I-131 SPECT/CT에서 Ringing Artifact 감소를 위한 다양한 Filter값의 적용)

  • Kim, Ha Gyun;Kim, Soo Mee;Woo, Jae Ryong;Oh, So Won;Lee, Jae Sung;Kim, Yu Kyeong
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.18 no.1
    • /
    • pp.62-68
    • /
    • 2014
  • Purpose: After I-131 therapy, SPECT/CT is useful in identifying location of thyroid remnants and metastasis of thyroid cancers. An excessive uptake of thyroid leads to a ringing artifact in the SPECT images. The aim of this study is to investigate and suggest a proper post filters to remove ringing artifact and produce better image quality. Materials and Methods: A low-cost, customized thyroid-mimicking phantom, consisting of an acrylic bottle and a hollow sphere was used for SPECT/CT Discovery (GE Healthcare, USA). It was filled with I-131 solution. The ratio of hollow sphere to background were varied as 50:1, 200:1, 1000:1 and 4000:1. Acquired images were reconstructed by OSEM (2 iterations, 10 subsets) with and without Evolution (resolution recovery correction, GE). Three different post-filters were applied; Butterworth (cut off: 0.38 to 0.58 with intervals of 0.05), Hanning (cut off: 0.8 to 1 with intervals of 0.05) and Gaussian (FWHM: 3 to 5 with intervals of 0.5) filters. Contrast, background variability, air area variability, and full width half maximum (FWHM) were compared. Results: Higher contrasts were obtained from the SPECT images with Evolution than without Evolution. In the case of images without Evolution, image distortion such as star artifact was generated. For all sphere-to-background ratio, the Butterworth filter showed better constrasts and FWHMs than other two filters, but the ringing artifact was still generated in all studies except 50:1 and it was decreased as cutoff value was increased. The ringing artifact didn't appear with Hanning and Gaussian filters at all studies, however constrats and FWHMs with Gaussian was worse than Hanning filter. For the images having ringing artifacts, the background variability and air area variability were increased. Conclusion: In this study, we suggested that it is desirable to use Hanning filter when the ringing artifact is generated and to use Butterworth filter when ringing artifact is not generated in I-131 SPECT.

  • PDF

Determination of Target Clean-up Level and Risk-Based Remediation Strategy (위해성에 근거한 정화목표 산정 및 복원전략 수립)

  • Ryu, Hye-Rim;Han, Joon-Kyoung;Nam, Kyoung-Phile
    • Journal of Soil and Groundwater Environment
    • /
    • v.12 no.1
    • /
    • pp.73-86
    • /
    • 2007
  • Risk-based remediation strategy (RBRS) is a consistent decision-making process for the assessment and response to chemical release based on protecting human health and the environment. The decision-making process described integrates exposure and risk assessment practices with site assessment activities and remedial action selection to ensure that the chosen actions are protective of human health and the environment. The general sequences of events in Tier 1 is as follows: initial site assessment, development of conceptual site model with all exposure pathways, data collection on pollutants and receptors, and identification of risk-based screening level (RBSL). If site conditions do not meet RBSL, it needs further site-specific tier evaluation, Tier 2. In most cases, only limited number of exposure pathways, exposure scenarios, and chemicals of concern are considered the Tier 2 evaluation since many are eliminated from consideration during the Tier 1 evaluation. In spite of uncertainties due to the conservatism applied to risk calculations, limitation in site-specific data collections, and variables affecting the selection of target risk levels and exposure factors, RBRS provides us time- and cost-effectiveness of the remedial action. To ensure reliance of the results, the development team should consider land and resource use, cumulative risks, and additive effects. In addition, it is necessary to develop appropriate site assessment guideline and reliable toxicity assessment method, and to study on site-specific parameters and exposure parameters in Korea.

Time-related Histopathologic Changes of Fresh Frozen Vascular Xenograft in Pig-to-goat Model (돼지-염소 모델에서 신선 동결된 이종 경동맥 이식편의 시간 경과에 따른 조직병리학적 변화)

  • Chang, Ji-Min;Kim, Won-Gon
    • Journal of Chest Surgery
    • /
    • v.40 no.3 s.272
    • /
    • pp.180-192
    • /
    • 2007
  • Background: As determined from the recent investigations of discordant cardiac xenotransplantation, hyperacute rejection occurs mainly at the endothelial cells in donor microvascular systems, but this does not occur at cardiac valve leaflets or at medium-to-large caliber vessels. On the basis of this background, this study was performed to look into the biocompatibility for transplantation of a middle or large diameter xenogenic blood vessel by conducting xenogenic arterial transplantation with the carotid artery in a pig-to-goat model. Material and Method: The experimental group was composed of 10 pairs of pig-to-goat combinations. They were divided into each period of 1 week, and 1, 3, 6 and 12 months. Four carotid artery grafts obtained through collection of the bilateral carotid arteries from two pigs were preserved at $-70^{\circ}C$ without other treatment, and then they were transplanted into the bilateral carotid arteries of two goats. Doppler ultrasonography was done on a periodic basis after transplantation to evaluate the patency of the grafted blood vessel. At the ends of a predetermined period, the grafts were explanted from the goats and they underwent gross examination. Hematoxylin-eosin and Masson's trichrome staining were conducted. In addition, in order to examine the immunological rejection of the grafted xenogenic blood vessel, immunohistochemical staining was conducted with T-lymphocyte indicator and von Willebrand factor. Result: Two goats at the each one-week period and the one-year period died during the experimental period because of a reason unrelated to the experimental procedure, and the remaining 8 goats survived until the end of each experiment period. On Doppler ultrasonography, unilateral carotid artery occlusion was found in a goat, whose period was specified as 3 months, among the 8 survived goats. However, the vascular patency was maintained well and there was no graft that formed aneurysms in the other goats. On gross examination, the region of vascular anastomosis was preserved well, and calcification of the grafted blood vessel was not shown. Histologically, the endothelial cells of the graft disappeared one week after transplantation, and then there was progressive spread of the recipients' endothelial cells from the anastomotic site. The reendothelialization occurred over the whole graft at one month after transplantation. The neointimal thickening and adventitial inflammation became severe by 3 months after transplantation, but this lessened at 6 months and 12 months, respectively. The rate of CD3 positive cells was very low among the infiltrated inflammatory cells. Conclusion: The fresh-frozen xenogenic artery kept its patency without being greatly influenced by xenogenic immune reaction.